General

  • Target

    0f5775695352815e9bd7bbaa654ae9f2c0396653c328fd548aed3d687b96bfe9

  • Size

    276KB

  • MD5

    0b6c2aa99b919cb214c9ee8b0919f9f5

  • SHA1

    b8282fa0acc8166c6ea48daa251c8d990fcda52c

  • SHA256

    0f5775695352815e9bd7bbaa654ae9f2c0396653c328fd548aed3d687b96bfe9

  • SHA512

    38601a5bb2e57a0e7bc24158d7c3388024b58da912e59a733adc3e824c3b34742b5654c1213175a3c32e6c55aa80ab1848c077eb46a14b2c2a19cf1cb6ae7bf8

  • SSDEEP

    6144:v4ABF94TpAuO/50BTnqPd0Mpz7qhh4nXjjf8MZ9BKXKx:gU1GLE0kuGnESBx

Score
10/10

Malware Config

Extracted

Family

cybergate

Version

v1.04.8

Botnet

imakethemods

C2

mjzd.no-ip.biz:82

Mutex

2GC667V63R7KS4

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    Winlog

  • install_file

    system32\winlog.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Remote Administration anywhere in the world.

  • message_box_title

    CyberGate

  • password

    20504helen

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

Files

  • 0f5775695352815e9bd7bbaa654ae9f2c0396653c328fd548aed3d687b96bfe9
    .exe windows x86


    Headers

    Sections